2006
DOI: 10.1109/acsac.2006.52
|View full text |Cite
|
Sign up to set email alerts
|

Towards Database Firewall: Mining the Damage Spreading Patterns

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The accuracy of the proposed could be improved with more availability of signatures and with more efficient pre-processing algorithm. [6] has stated that the most used recovery mechanism during database crash is either rolling back or re-executing the damaged instructions. In such mechanisms database service is either stopped triggering denial of service to critical applications or ending up corrupting clean data during the execution of the new transactions.…”
Section: Fig 3: Character and Character Combination Setsmentioning
confidence: 99%
“…The accuracy of the proposed could be improved with more availability of signatures and with more efficient pre-processing algorithm. [6] has stated that the most used recovery mechanism during database crash is either rolling back or re-executing the damaged instructions. In such mechanisms database service is either stopped triggering denial of service to critical applications or ending up corrupting clean data during the execution of the new transactions.…”
Section: Fig 3: Character and Character Combination Setsmentioning
confidence: 99%
“…Previous work [1,2,3,4,13,14,19] of attack recovery heavily depends on exploiting the system log to find out the pattern of damage spreading and schedule repair transactions. The analysis of system log is very time consuming and hard to satisfy the performance requirement of online recovery.…”
Section: Related Workmentioning
confidence: 99%
“…Previous work [1,2,3,13,14,19] of attack recovery heavily depends on exploiting the system log to find out the pattern of damage spreading and schedule repair transactions. The analysis of system log is very time consuming and hard to satisfy the performance requirement of on-line recovery.…”
Section: Related Workmentioning
confidence: 99%